Home

Friendzone

The initial Nmap scans shows the following ports opened: 21, 22, 53, 80, 139, 443. Lets start with port 80. The site displays a web page that says “Have you ever been friendzoned?” with an image. The source code doesn’t show much, it was coded with simple HTML tags. GoBuster scans shows an accessible robots.txt and word...

Read more

HDC

On the main page, it shows a simple login form. The first thing I did is browse around the source code and see if there are any hidden username and passwords. There are two js files, jquery-3.2.1.js and myscripts.js that I looked into. myscripts.js has a function named doProcess() which handles the submission I would imagine. Let’s ta...

Read more

Traverxec

nmap scans show port 22 and 80 is opened. Port 80 displays a basic bootstrap template and nothing stands out in the source code when inspected. After checking out the nmap results in detail, I noticed the HTTP server header displays nostromo 1.9.6. After researching what nostromo server is about, it’s a lightweight http server. Searchi...

Read more

Netmon

Nmap scans show FTP is open on port 21 with allowed anonymous access. Looking through the directories, I found the user.txt flag, that was way too easy. Nmap scans show Netmon is running a web server on port 80. The web server is hosting a web application called PRTG which is a network monitoring software. The version 18.1.37.139...

Read more

Pentesting Azure Applications

Currently reading Amazon Link 1: Preparation Clouds are reasonably secure by default As a penetration tester, if the project scope is limited to one cloud-hosted server and you can’t include anything else in the test, you’re likely to fail and give the impression that their cloud assets are impenetrable. ...

Read more

Lernaean

“Your target is not very good with computers. Try and guess their password to see if they may be hiding anything!” This challenge wasn’t too bad. The parts that I struggled with was getting the right syntax for hydra and putting together a post request script in Ruby which I’ve partially borrowed from Emdee five for life - Web challenge. ...

Read more

Emdee Five For Life

“Can you encrypt fast enough?” This was my first challenge on HTB. It was fun and a little bit challenging. I couldn’t write this in Python as it was annoying for something this simple. I should do it in Python though so at least I understand how to write HTTP responses. In Ruby, I had less of trouble as the documentation is better and understa...

Read more

Cartographer

“Some underground hackers are developing a new command and control server. Can you break in and see what they are up to?” This challenge was finding out if you can bypass the login screen. At first, I thought the hint was Cartography so I thought that “oh, maybe I take the .png image and decode the message using steganography tools.” Nope, ...

Read more